Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader.

Patents

  1. Advanced Patent Search
Publication numberUS5933829 A
Publication typeGrant
Application numberUS 08/967,383
Publication dateAug 3, 1999
Filing dateNov 8, 1997
Priority dateNov 8, 1996
Fee statusPaid
Also published asEP1012694A1, EP1012694A4, US6108656, WO1998020411A1
Publication number08967383, 967383, US 5933829 A, US 5933829A, US-A-5933829, US5933829 A, US5933829A
InventorsRobert T. Durst, Kevin Hunter
Original AssigneeNeomedia Technologies, Inc.
Export CitationBiBTeX, EndNote, RefMan
External Links: USPTO, USPTO Assignment, Espacenet
Method for a client computer to retrieve a computer file
US 5933829 A
Abstract
The present invention is a secure system and method for providing automated access to electronic information stored in a database in either a local or remote location. The system utilizes a machine-readable code printed on a document, referred to herein as an intelligent document since it stores information used to automatically access the information. The machine-readable symbol is encoded with source data (including a file location pointer) that is first obfuscated by generating a checksum of the source data, encrypting the source data by using the checksum as an encryption key, and assembling the checksum with the encrypted source data prior to encoding. The machine-readable symbol is then printed and distributed by the vendor by any logical means to the end user. The end user then scans the code via appropriate code scanning (e.g. bar code scanning) equipment, and de-obfuscates the scanned data by parsing the checksum, decrypting the remainder of the scanned data string (which includes the file location pointer) using the parsed checksum as a decryption key, computing a checksum of the decrypted data string, and comparing the computed checksum with the parsed checksum to determine the validity of the code. The file location pointer is then used to access the appropriate file. In a preferred embodiment, a Web browser program is launched, and the URL of the vendor's Web site is accessed through the Internet.
Images(10)
Previous page
Next page
Claims(58)
We claim:
1. A method for a client computer to retrieve a computer file comprising the steps of:
a) encoding a symbol data string comprising a file location pointer into a machine readable symbol;
b) rendering said machine readable symbol within a data carrier;
c) transposing an input data string from said machine readable symbol with a computer input device coupled to said client computer;
d) parsing said input data string to determine said file location pointer; and
e) utilizing said file location pointer to request the computer file designated thereby.
2. The method of claim 1 wherein said utilization step comprises the steps of:
passing said file location pointer to an application program on said client computer suitable for processing the corresponding computer file; and
the application program retrieving the computer file from the specified file location.
3. The method of claim 1 wherein said utilization step comprises the steps of:
retrieving a copy of the computer file from the specified file location; and
invoking an application program on said client computer suitable for processing the corresponding computer file.
4. The method of claim 1 wherein said file location pointer specifies the location of a computer file stored in a local memory resident in said client computer, and wherein said computer file is obtained from said local memory.
5. The method of claim 1 wherein said utilization step further comprises the steps of:
f) assembling a computer file transfer request word comprising said file location pointer, and
g) transmitting said computer file transfer request word to a target server computer via a computer network system.
6. The method of claim 5 wherein said computer network system is an Internet, and wherein said computer file transfer request word is directed towards a target server computer in communication with the Internet.
7. The method of claim 6 wherein said file location pointer comprises a uniform resource locator (URL) for specifying a file on the target server computer in communication with the Internet.
8. The method of claim 5 wherein said computer network system is a local area network, and wherein said computer file transfer request word is directed towards a target server computer in communication with said local area network.
9. The method of claim 5 further comprising the steps of
h) said target server computer receiving said computer file transfer request word and
i) said target server computer transmitting a computer file to said client computer in response thereto.
10. The method of claim 9 wherein said file location pointer comprises a network address associated with said target server computer and a file identifier correlated to the computer file requested by said client computer.
11. The method of claim 9 wherein said machine readable symbol also has encoded therein a source identifier data string, said source identifier data string comprising data correlated to an expected user of said data carrier, and wherein said source identifier data string is transposed by said computer input device.
12. The method of claim 11 wherein said source transposed source identifier data string is assembled within said computer file transfer request word and transmitted to said target server computer.
13. The method of claim 12 wherein said target server computer stores said source identifier data string received from said client computer in said computer file transfer request word.
14. The method of claim 12 wherein
said machine readable symbol also has encoded therein an encryption key associated with said source identifier data string,
said encryption key is transposed by said computer input device,
said transposed encryption key is used by said client computer to encrypt information specific to a user associated with said client computer, and
said encrypted user information is assembled within said computer file transfer request word and transmitted to said target server computer.
15. The method of claim 14 wherein said information specific to a user is obtained, prior to encryption thereof, from a user information data file stored on said client computer.
16. The method of claim 14 wherein
said machine readable symbol also has encoded therein user demographics data,
said user demographics data correlated to a targeted user of said data carrier,
said user demographics data is transposed by said computer input device, and wherein
said information specific to a user is obtained, prior to encryption thereof, from said transposed user demographics data.
17. The method of claim 14 wherein
said target server computer utilizes said source identifier data string to access a lookup table to determine a decryption key associated with said encryption key, and
said target server decrypts said encrypted user information received from said client computer.
18. The method of claim 17 wherein said lookup table is stored locally on said target server computer.
19. The method of claim 17 wherein said lookup table is stored remotely on a secondary server computer.
20. The method of claim 17 wherein said user information comprises a credit card number associated with said user of said client computer, and wherein on online electronic commercial transaction is accomplished by utilizing said credit card number.
21. The method of claim 9 wherein said machine readable symbol also has encoded therein user demographics data, said user demographics data correlated to a targeted user of said data carrier, and wherein said user demographics data is transposed by said computer input device.
22. The method of claim 21 wherein said user demographics data is included in said file transfer request word transmitted to said target computer, and wherein said user demographics data is stored in said target server computer.
23. The method of claim 22 wherein said computer file transmitted by said target server computer to said client computer is at least partially determined by at least part of said user demographics data.
24. The method of claim 1 wherein said machine readable symbol also has encoded therein an executable command to launch a software utility resident on said client computer, and wherein said software utility is automatically launched after said machine readable symbol is transposed.
25. The method of claim 24 wherein said software utility is an Internet browser program.
26. The method of claim 24 wherein said software utility is a word processing program.
27. The method of claim 26 wherein said word processing program is caused to execute a print command of a computer file.
28. The method of claim 1 wherein
said data carrier is a document,
said machine readable symbol is a bar code symbol,
and said computer input device is a bar code scanning device.
29. The method of claim 28 wherein said bar code symbol is a two-dimensional bar code symbol encoded in the PDF417 symbology.
30. A computer system comprising:
a) a client computer and
b) a computer input device coupled to said client computer, adapted to read a machine readable symbol from a data carrier and transmit to said client computer an input data string;
wherein said client computer comprises
processing means for transposing said input data string to a plurality of constituent fields, said fields comprising at least a file location pointer;
means for utilizing said file location pointer to it request the computer file designated thereby.
31. The computer system of claim 30 wherein said file location pointer utilization means comprises
means for passing said file location pointer to an application program on said client computer suitable for processing the corresponding computer file; and
means for the application program to retrieve the computer file from the specified file location.
32. The computer system of claim 30 wherein said file location pointer utilization means comprises
means for retrieving a copy of the computer file from the specified file location; and
means for invoking an application program on said client computer suitable for processing the corresponding computer file.
33. The computer system of claim 30 wherein said file location pointer utilization means comprises means for obtaining, as a function of said file location pointer, a computer file from local memory resident in said client computer file is obtained from said local memory.
34. The computer system of claim 30 wherein said client computer is interconnected to a computer network comprising a target server computer associated therewith, and wherein said file location pointer utilization means comprises:
means for assembling a computer file transfer request word comprising said file location pointer, and
means for transmitting said computer file transfer request word to said target server computer via said network.
35. The computer system of claim 34 wherein said computer network is an Internet, and wherein said computer file transfer request word is directed towards a target server computer in communication with the Internet.
36. The computer system of claim 35 wherein said file location pointer comprises a uniform resource locator (URL) for specifying a file on the target server computer in communication with the Internet.
37. The computer system of claim 34 wherein said computer network is a local area network, and wherein said computer file transfer request word is directed towards a target server computer in communication with said local area network.
38. The computer system of claim 34 wherein said target server computer comprises:
means for receiving said computer file transfer request word; and
means for transmitting a computer file to said client computer in response to said computer file transfer request word.
39. The system of claim 38 wherein said file location pointer comprises a network address associated with said target server computer and a file identifier correlated to the computer file requested by said client computer.
40. The computer system of claim 38 wherein said input data string fields also comprise a source identifier data string, said source identifier data string comprising data correlated to an expected user of said data carrier.
41. The system of claim 40 wherein said assembling means also assembles said source identifier data string within said computer file transfer request word.
42. The computer system of claim 44 wherein said target server computer further comprises means for storing said source identifier data string received from said client computer in said computer file transfer request word.
43. The computer system of claim 41 wherein
said input data string fields also comprise an encryption key associated with said source identifier data string,
and wherein said client computer further comprises
means for encrypting with said encryption key a user information data file stored on said client computer, said user information data file comprising information regarding the user associated with said client computer, and
wherein said encrypted user information data file is assembled within said computer file transfer request word and transmitted to said target server computer.
44. The computer system of claim 43 wherein said client computer comprises memory means for storing a user information data file, and wherein said information specific to a user is obtained, prior to encryption thereof, from said user information data file.
45. The computer system of claim 43 wherein said input data string fields also comprise user demographics data correlated to a targeted user of said data carrier, and wherein said information specific to a user is obtained, prior to encryption thereof, from said user demographics data.
46. The computer system of claim 45 wherein said target server computer comprises:
means for accessing a lookup table, said lookup table for storing a decryption key associated with said source identifier data string, to obtain said decryption key associated with said source identifier data string, and
means for decrypting, utilizing said decryption key, said encrypted user information received from said client computer.
47. The computer system of claim 46 wherein said lookup table is stored locally on said target server computer.
48. The computer system of claim 46 wherein said lookup table is stored remotely on a secondary server computer.
49. The computer system of claim 46 wherein said user information comprises a credit card number associated with said user of said client computer, and wherein said client computer further comprises means for executing on online electronic commercial transaction by utilizing said credit card number.
50. The computer system of claim 38 wherein said input data string fields also comprise user demographics data correlated to a targeted user of said data carrier.
51. The computer system of claim 50 wherein said user demographics data is included in said file transfer request word transmitted to said target computer, and wherein said target server computer comprises means for storing said user demographics data.
52. The computer system of claim 51 wherein said target server computer comprises means for utilizing said user demographics data to at least partially determine the computer file transmitted by said target server computer to said client computer.
53. The computer system of claim 30 wherein said input data string fields also comprise an executable command to launch a software utility resident on said client computer, and wherein said software utility is automatically launched after said machine readable symbol is transposed.
54. The computer system of claim 53 wherein said software utility is an Internet browser program.
55. The computer system of claim 53 wherein said software utility is a word processing program.
56. The computer system of claim 55 wherein said word processing program is caused to execute a print command of a computer file.
57. The computer system of claim 30 wherein said computer input device is a bar code scanning device.
58. The computer system of claim 57 wherein bar code scanning device is suitable for scanning a two-dimensional bar code symbol.
Description
CROSS-REFERENCE TO RELATED APPLICATION

This application is based on and claims the priority of co-pending provisional patent application filed in the United States Patent and Trademark Office on Nov. 8, 1996 and assigned Ser. No. 60/030,166.

BACKGROUND OF THE INVENTION

Electronic data sources, such as conventional databases, the Internet (i.e., the World Wide Web("WWW")) are a rich and important means of information retrieval and distribution and, increasingly, electronic commerce. However, there are problems finding the information desired in this increasingly complex and changing network of data sources. Recently introduced Internet "search engines", such as YAHOO, help by allowing a user to search on-line indices of information sources, and even full source text, for relevant key words and phrases related to their topic of interest, but even carefully structured queries by experienced users often results in hundreds and even thousands of possible "hits" which are not sufficiently specific to preclude further manual search which is both data resource inefficient and time consuming.

Because of these inefficiencies, as well as general lack of familiarity with search engines and their syntax, users often rely on human readable print and broadcast media advertising to identify source addresses (e.g., Uniform Resource Locators ("URLs")) for Web sites and other online information of interest. Print media is particularly effective since: (1) it is the most ubiquitous method of communication and advertising in the modern world; and (2) a printed document can serve as a persistent reference to be saved and used during a subsequent on-line session.

However, human readable printed source addresses, and especially URL's, are particularly difficult to manually enter in software programs, such as web browsers, due to their length and use of complex and unfamiliar symbols. If the characters in a URL are not entered exactly, retrieval is prevented or, in a limited number of cases, a legal but incorrect source is accessed. This is especially true when URLs incorporate foreign languages and/or complex query instructions to on-line databases, as is increasingly frequent in most Web sites. In addition, the inability to type or otherwise manually enter symbolic address information due to either disability or lack of training complicates use of on-line information resources such as the Internet for millions of individuals.

Finally, it is widely anticipated that Internet access will increasingly be provided through interactive cable television via Web-ready television receivers and set-top boxes used in conjunction with conventional television receivers. In this home entertainment environment, it is difficult to use keyboards for address entry due to both lack of typing skill and the cumbersome placement of these components. Another method which would eliminate typing and allow users to directly link printed addresses and query scripts to electronic information sources would be highly desirable.

Companies that host Web sites for the purpose of providing information such as advertising, often want to know the identity and other related information of the users who visit their sites (i.e., download files therefrom). It would be quite advantageous to provide such companies or vendors with this information as part of a specific file transfer request, e.g., as part of a CGI parameters string included in a URL. Additionally, it would be desirable to be able to effect a secure manner of transferring this information, so that a user would have confidence in the system and thus send sensitive information such as a credit card number or the like with the file transfer request. This would enable electronic commerce to flourish well beyond the point it exists today.

SUMMARY OF THE INVENTION

The present invention is a system and method for providing automated access to electronic information stored in a database in either a local or remote location. The system utilizes a machine-readable code printed on a document, referred to herein as an intelligent document since it stores information used to automatically access the information. The machine-readable symbol comprises encoded source data, wherein the source data comprises application launch information as well as file location information. The source data is encoded and printed, and then distributed by the vendor by any logical means to the end user. The end user then scans the code via appropriate code scanning (e.g. bar code scanning) equipment, decodes the raw decoded data, and the file location information is then used to access the appropriate file. In a preferred embodiment, a Web browser program is launched, and the URL of the vendor's Web site is accessed through the Internet. Local file retrieval may also be implemented on the client computer itself, as well as over an intranet or LAN environment. Additional user-specific demographic data such as the user's name and address may also be encoded in the machine-readable code when the document is specifically tailored for individual targeting, such as mailing labels. This demographic information is uploaded to the WWW site for use by the vendor. In addition, the present invention encodes security data, such as an encryption key, for use in secure data transmissions such as electronic commerce over the Internet.

In particular, the present invention is a method and system for a computer, such as a client computer in a networked computer system, to retrieve a computer file in which a symbol data string comprising a file location pointer is encoded into a machine readable symbol such as a two-dimensional bar code symbol, and the machine readable symbol is rendered within a data carrier (e.g. printed on an intelligent document). A computer input device such as a two-dimensional bar code scanner is coupled to the client computer and transposes an input data string from the machine readable symbol. The computer parses the input data string to determine the file location pointer, and the file location pointer is then utilized pointer to request the computer file designated thereby.

The file location pointer may be utilized to request the computer file by either passing it to an application program on the client computer suitable for processing the corresponding computer file, and then the application program retrieving the computer file from the specified file location. Alternatively, the file location pointer may be utilized to request the computer file by retrieving a copy of the computer file from the specified file location, and then invoking an application program on the client computer suitable for processing the corresponding computer file.

The client computer assembles a computer file transfer request word including the file location pointer and transmits the request word to a target server computer over a computer network system, which may be a wide area network such as the Internet or a local area network (LAN) or intranet. The file location pointer may alternatively specify the location of a computer file stored in a local memory resident in the client computer rather than on a target server computer. When the computer file to be retrieved is on a target server computer on a network, then the file location pointer is a network address associated with the target server computer and a file identifier correlated to the computer file requested by said client computer. In particular, when utilizing the Internet, the file location pointer may be in the form of a uniform resource locator (URL). In any type of networked environment, the target server computer receives the computer file transfer request word and transmits a computer file to the client computer in response thereto.

In addition to the file location pointer, the present invention takes advantage of the information density of the two-dimensional symbology by encoding a source identifier data string within the machine readable symbol. The source identifier data string is used to denote the particular source of the data carrier such as a particular magazine or ad, or can be used to denote an expected user or targeted group of users of the data carrier. The source identifier string is then transposed by the client computer, assembled within the computer file transfer request word, and transmitted to the target server computer. The target server computer stores the source identifier data string received from the client computer in the computer file transfer request word.

Additionally, the machine readable symbol also has encoded therein an encryption key associated with the source identifier data string, which is also transposed by the computer input device. The encryption key is used by the client computer to encrypt information specific to a user of the client computer, and the encrypted user information is assembled within the computer file transfer request word and transmitted to the target server computer. The information specific to a user may be obtained, prior to encryption, from a user information data file stored on the client computer, or it may be obtained from user demographics data correlated to a targeted user of the data carrier that had been previously encoded within and transposed from the machine readable symbol.

The target server computer may then utilize the source identifier data string received as part of the file transfer request word to access a lookup table to determine a decryption key, and then decrypt the encrypted user information received said client computer in the file transfer request word. The lookup table may either be stored locally on the target server computer, or it may be stored remotely on a secondary server computer.

The decrypted user information may comprise sensitive user information such as a credit card number associated with the user of said client computer, thus enabling on online electronic commercial transaction by utilizing the credit card number. The user demographics data may be used by the target server computer to determine the file to transmit to the client computer; i.e. certain files may be targeted to specific users of the system.

The machine-readable symbol may also have encoded therein an executable command to launch a software utility resident on the client computer, and the software utility is then automatically launched after the machine readable symbol is transposed. For example, the software utility may be an Internet browser program or a word processing program. In addition, specific functions may also be encoded in the machine readable symbol along with the application launch command, such as a command to execute a print job of the retrieved computer file.

The symbol data string may optionally be obfuscated prior to being encoded into the machine readable symbol, in which case the input string transposed must likewise be de-obfuscated by the client computer. The obfuscation may be by computing a checksum of the symbol data string, encrypting the symbol data string by utilizing the checksum as an encryption key, and assembling the checksum with the encrypted symbol data string prior to encoding into the machine readable symbol. The de-obfuscation would then be accomplished by parsing the input data string to determine the checksum, decrypting the encrypted symbol data string with the checksum as a decryption key, computing a checksum of the decrypted symbol data string, and comparing the computed checksum with the checksum from said input data string. A valid data condition would be indicated when the comparison step is successful; and an invalid data condition would be indicated when the comparison step is unsuccessful.

BRIEF DESCRIPTION OF THE DRAWING

FIG. 1 is a diagram of the system of the present invention.

FIG. 2 is a diagram of the document generation function of FIG. 1.

FIG. 3 is a diagram of the client computer functions of FIG. 1.

FIG. 4 is a diagram of the deobfuscating function carried out by the client computer of FIG. 3.

FIG. 5 is a diagram of the target server computer of FIG. 1.

FIG. 6 is a top level flowchart of the method of the present invention.

FIG. 7 is a flowchart of the document generation of the present invention.

FIGS. 8 and 9 are a flowchart of the scanning and processing by the client computer of the present invention; and

FIG. 10 is a flowchart of method used by the target server computer of the present invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

The system 100 of the present invention for generating and reading an intelligent document 10 is illustrated in block diagram form in FIG. 1. The system 100 comprises an intelligent document generation system 14, which encodes, assembles and prints an intelligent document 10 for subsequent scanning at a client computer.

The system operates as follows: A vendor who wishes to provide an intelligent document 10 programs certain parameters into a data string 20 which will be encoded within a machine-readable code 12 and printed on the document along with text 16 or graphics 18. The document may be an advertisement in the form of a magazine insert or page, a brochure, a label for an envelope, a memorandum, and the like.

Parameters to be included within the machine-readable code depend upon the application desired by the vendor. FIG. 2 illustrates fields 1-6 of the symbol data string 20, which may comprise a file location pointer 21, a launch command 22, a user demographics field 23, a source identifier 24, an encryption key 25, and/or a code type field 26. For example, if the vendor wants the end-user to be able to access the vendor's Web site automatically upon scanning the symbol 12, then the parameters included in the machine-readable symbol may include the launch command 22 to launch an Internet browser application, such as NETSCAPE, and a Uniform Resource Location (URL) code into the file location pointer 21, such as http://www.xyzcorp.com. This information is encoded in accordance with the particular type of machine code being used. For example, one type of code which may be used by the present invention is a PDF417 symbol, which is described in detail in U.S. Pat. No. 5,304,786, which is incorporated by reference herein. The PDF417 symbol, known as a two-dimensional bar code symbol, has enough storage information to encode the browser launch command as well as the full URL.

A printer 30 then utilizes the encoded data and desired text and graphics to print an intelligent document 10 a shown in the Figures. The symbol data string 20 may also be obfuscated for security purposes, which will be described in detail below.

The intelligent document 10 is disseminated to the end user in accordance with the methods desired by the vendor. For example, if the intelligent document 10 is a magazine advertisement, then the user will obtain the magazine by conventional means such as purchase at a retail outlet, the mail, etc.

The user, after reading the text and graphics in the document, can access the Web site of the vendor by utilizing a scanner 34 in conjunction with his client computer 32, programmed with appropriate software in accordance with the invention. That is, the user will optically scan the code 12 with an optical scanner. An optical scanner sufficient to scan bar code symbols and the like is disclosed in U.S. Pat. No. 5,448,050, which is incorporated herein by reference. The device disclosed in the '050 patent is housed within a mouse type device, thus also including circuitry useful in point-and-click applications popular in personal computer platforms today.

After the two-dimensional bar code data is scanned by the scanner 34, a decoder 36 is used to decode the raw data into usable commands and data. The decoder is typically a software program executed by the microprocessor of the computer, and provides thereby to an Internet browser 40 the URL which had been encoded by the vendor into the symbol 12. The browser 40 application is then loaded (if not already running on the computer 32) by the launch command, and the URL is used to access the Web site of the vendor accordingly at the target server computer 46 via the Internet 44. As a result, the user may automatically access the vendor's Web site to obtain a computer file therein without having to enter the URL by a keyboard, thus eliminating all chances of error due to manual data input. The requested file is obtained from file storage and generation means 50, and sent to the client computer via the Internet for display to the user on the browser 40.

The above scenario is useful when a vendor prints and distributes such intelligent documents on a mass scale. That is, the symbol 12 distributed is the same for each user. In an alternative embodiment, specific demographic information is included with the code to provide for personalized operation as follows. This scenario is useful when the vendor makes individual printings keyed to individual users, such as when mailing labels are printed for inclusion on an envelope surrounding a magazine or the like.

In this case, the vendor may include in the user demographics field 23 personal data such as the user's name, location, phone number, and other appropriate demographic information. When the user scans the document and accesses the Web site, the personal data is uploaded to the target server, thus providing the vendor with useful demographic data as to which user's have actually utilized the intelligent document scanning service.

The code may also include security information useful in completing secure transfers across the Internet. For example, an encryption key 25 appropriate in a public or private key system may be embedded within the symbol 12. An appropriate software routine in the user's computer utilizes the key after decoding it in order to encrypt certain data being sent across the Internet. For example, the encryption of credit card information is desired in order to thwart would-be intruders from misappropriating the information. The system of the present invention could be used to allow the user to order an item advertised in the brochure by taking the credit card number, already resident in the user's computer memory, and encrypting it with the key decoded from the code. When the user desires to purchase the item, he scans the associated code, and the credit card number is encrypted and transmitted as the Web site is accessed. The target server computer can match the source identifier string 24 sent with the transmission with the appropriate decryption key stored in a lookup table at the target server or on an external computer, and decrypt the credit card number accordingly.

The system 10 of the present invention has additional embodiments which allow quick and easy retrieval of a data file on an intranet or Local Area Network (LAN). Thus, a department of a company may distribute fliers regarding certain events, new products, etc., and encode appropriate document access information in accordance with the teachings of the invention. The user may obtain further information by scanning the code on the document, which then causes his computer to access his network, file server, etc.

This embodiment is also useful in a small office environment, where a user prints out documents such as letters or memos that may need to be revised at a later date. It is common practice to manually type in the drive location of the document in the lower corner of the document to allow the user to easily access the document at a later date, without searching through massive amounts of files. Thus, a user may type in the text "c:\user\files\smith\clients.backslash.letters\xyzcorp\jonesltr\dec12" to indicate its location on his drive. When he desires to edit or otherwise access the document, he would, in the prior art, have to type in the entire location after launching the proper application (e.g. word processor). In accordance with the teachings of the present invention, a machine readable code may be encoded with this information as the file location pointer (as well as a command to launch the application) and printed on the document. When the user later desires to edit the document, he scans the code. The code is decoded, the application is launched, and the file is fetched from the location specified in the code.

The invention will now be described in further detail.

FIG. 2 is an illustration of the obfuscation function of the present invention. Prior to being encoded, the symbol data string may optionally be obfuscated in order to improve the security aspects of the system. The symbol data string is input into a checksum computing means 62, which then computes the checksum of the symbol data string in accordance with teachings well known in the prior art. The computed checksum is then used as a key in an encryption scheme 66 which may be one of several well known encryption methodologies known in the prior art. The key 64 is assembled in the clear (i.e., unencrypted) along with the encrypted symbol data string into by the encoding function 29. After this encrypted data string and cleared checksum data is encoded, it is rendered by the printer 30 in accordance with methods well known in the art and the intelligent document is thereby generated.

After the intelligent document 10 is distributed to the user, the bar code symbol 12 is scanned by bar code scanner 34 and processed as follows. The scanned symbol data is decoded by means well known in the art in accordance with the particular symbology implemented to encode the symbol 12. Once the symbol data has been decoded, it is deobfuscated (if the original symbol data had been obfuscated as described above) by deobfuscation function 37 which is illustrated in detail in FIG. 4. First, the clear checksum 64 is utilized as a key to decryption function 97 to decrypt the encrypted string 67. The decryption function 97 which was preloaded onto the client computer as part of an initialization process with the system is a corollary to the encryption function 66. By passing the checksum 64 in the clear and utilizing it as the key, it enables the client computer and document generation computing means to be synchronous with respect to the encryption methodology. After the decryption function 97 produces the clear data string comprising the original file location pointer 21, launch command 22, user demographics 23, source ID 24, key 25 and code type 26, then the checksum computing means 99 operates to compute a checksum of those fields. That computed checksum is then compared by comparison block 101 with the received clear checksum 64 that was decoded by the decoding process 36. If the comparison process 101 indicates that the computed checksum equals the received clear checksum, then go/no go signal 103 indicates that the data transmission and decryption process was successful. If, however, the checksums are not favorably compared, then the go/no go signal 103 will indicate an unsuccessful transmission and decryption process. If this is unsuccessful, then further processing is aborted.

Once the symbol data is deobfuscated, it is then parsed by parsing block 39 in order to utilize the constituent fields as follows. The file location pointer 21 and source identifier string 24 are assembled into a register that will comprise the file transfer request. The file transfer request register is also loaded with a client version 72 taken from local memory 70 on the client computer. The user demographic string 23 is optionally fed into an encryption block 80 which is then used with encryption key 25 to encrypt that data and put the results as encrypted user information 82 into the file transfer request string 90. Optionally, the encryption function 80 may utilize certain local user data 74 that had been stored on the memory 70 of the client computer. This local user data may comprise sensitive information, such as the user's credit card number. Advantageously by encrypting this information the user will have a higher level of confidence that this sensitive information can be transmitted over the Internet for applications such as electronic commerce. Thus, the file transfer request register 90 will comprise the file location pointer 21, the client version 72, certain encrypted user information 82 and the source identifier 22.

The code type string 26 is compared by block 78 to the internally stored code type 76. If the comparison is unsuccessful, then further processing is aborted. This process is useful to enable certain versions of the client software to be distributed such as on a demonstration or trial basis, and this trial software will only work with certain documents generated by corresponding document generation software modules. Thus, a user having a trial version will not be able to fully utilize the system until it purchases by license or otherwise the production version. Utilization of this type of code type matching also enables the system vendor to control expired licenses, etc.

Once the file transfer request has been successfully assembled, it is then sent to the appropriate interface in order to obtain the requested file. In the preferred embodiment, the file transfer request will take the form of a uniform resource locator (URL) which will be sent to the Internet browser software 40 that is resident and on the client computer. Optionally, if the file transfer request string indicates that the file is located on a Local Area Network such as LAN 98, then the file transfer request will be transmitted through the LAN interface 96 of the client computer in order to obtain the correct file. Further optionally as described above, the file transfer request may seek to obtain a file stored in local memory, such as on the user's hard drive 94.

Referring to FIG. 5, the operation of the target server computer will now be described in detail. When the file transfer request 90 indicates that the file to be retrieved is located on an Internet file server, then the file location pointer 21 will comprise a URL, which comprises an IP address (Internet Protocol), as well as a file identifier. The IP address, as is well known in the art, is the address of the target server computer on the Internet. The Web server program 112 that is running on the target server computer 46 receives the URL over the Internet 44 and strips out certain parameters contained therein. The source identifier 24 is used to access a look up table 110 which comprises a plurality of source identifier strings and their associated decryption keys. This decryption key that is obtained from the key table 110 is then used by decryption block 114 to decrypt the encrypted user information received in the file transfer request. Decryption function 114 is corollary to the encryption function 80 performed at the client computer. Thus, the secure information transferred with the file transfer request is decrypted and user information file 122 may be stored in user log 52, along with the date and time stamp 120 to indicate when the particular request was received. This information is quite valuable to the vendor, since it enables it to determine the name and other useful information relating to users who have accessed its Web site. This information may also be utilized by file generation and storage means 50 to dynamically determine the file or files to be sent back to the client computer. For example, if the demographics data indicates that the user would prefer the file returned back in a language other than English, that file can be accessed or generated appropriately. Thus, in addition to retrieving a static page stored in the target server computer, the system of the present invention allows dynamic generation and return of computer files in accordance with user's preferences indicated in the transfer request. In addition, as described herein, if the user has allowed his credit card number to be encrypted and sent with the file transfer request, then the target server computer can decrypt the credit card number and utilize it to perform a secure on-line transaction.

In the alternative to having a file resident on the target server computer, it may be required for the target server computer to access an auxilliary file server 118 to get the external file and return it back to the client computer. The auxilliary file server 118 may be accessed directly, through a dial up modem connection, or through the Internet. In addition, an external key server 116 is accessible by the target server computer if it is desired by the system designer to keep the key table 110 remote from the target server computer, rather than local therein. By keeping a key table 110 at a central server location, the system provider can keep track of server requests to decrypt user information and charge a fee accordingly. Thus, a vendor utilizing this system may have the option of paying a "per click" fee to determine the user demographics of each user that accesses his server or may just provide files back to the user without obtaining that knowledge on a less costly basis.

When the file is returned back to the client computer through the Internet 44, it may be displayed in a manner well known in the art on the Internet browser 40. Thus, the system of the present invention has provided an easy and error proof way for a user to obtain a computer file from an Internet server computer by simply scanning a code provided on an intelligent document and having the client automatically process the code, request the file wherein the file is then returned by the target server computer and displayed to the user.

FIGS. 6 through 10 illustrate the flowcharts of the methodologies employed by the present invention. FIG. 6 is an overall flowchart wherein step 202 illustrates the data string comprising the file location pointer, launch command, user demographics, source identifier, key and code type. At block 204, the data string is utilized to generate an intelligent document 10 which is also distributed to the end users. At step 208, the bar code symbol is scanned, and at step 210 the data is decoded and processed and the file request is assembled. At step 212 the file request is transmitted over the Internet and at step 214 the target server fetches and/or generates the computer file requested. Finally, at step 216 the file is transmitted to the client computer and displayed on the browser to the user.

FIG. 7 is a more detailed flowchart of the document generation procedure. The data string at 202 is used to compute a checksum at step 218. At step 220, the checksum is used to encrypt the data string and at step 222 the checksum and encrypted data string are assembled. At step 224 the bar code symbol is encoded and at step 226 the bar code symbol is printed with optional text and graphics onto the intelligent document 10.

FIGS. 8 and 9 illustrate the detailed operation of the client computer. At step 208 in FIG. 8, the bar code symbol is scanned. At step 218 the input data string is parsed in order to derive the checksum and it is then decrypted with the checksum as the key. The decrypted string is used to computer a checksum and the received checksum is compared with the computed checksum. If the checksums are not equal, an invalid condition is declared and the process exits at step 230. If data is indicated valid at step 232, then the stored code type is fetched from the client's memory at step 234. A comparison of the code type from the client memory with the received code type is compared at step 230. If an invalid data condition is indicated in this test, then the process exits at step 230 and if the code types match, then the process continues with an unpacking of the decrypted string at step 238.

Referring now to FIG. 9, the step 240 will encrypt the user data file from the client memory and optionally the user demographics received from the bar code to generate an encrypted user file. At step 242, the encrypted user file is assembled into the file transfer request 248. At step 244, the file location pointer comprising the IP address and file ID and the source ID are also assembled into the file transfer request and at step 246, the client version is fetched from local memory and assembled into the file transfer request. At step 250, the browser is provided with the file transfer request and is optionally started by the launch command in the received string. At step 252, the file transfer request is transmitted to the target server, preferably in the preferred embodiment over the Internet in order to obtain the requested file.

FIG. 10 illustrates the details of the methodologies employed by the target server computer. At step 254, the target server computer receives the file transfer request, and at step 256 the Web server program running on the target server computer uses the received source identifier to fetch the associated decryption key which may be internal or externally located. At step 258, the user file is decrypted and the user data is stored in a log. If the static page has been requested by the user, then the file location is looked up as a function of the file identifier. At step 264, the file is fetched from that location at step 268 and returned to the client computer via the Internet at step 270. If the static page was not requested at block 262, then a dynamic page is generated at step 266 which typically will be a function of the file identifier and/or the user data that had been received and decrypted. Again, the file is then returned to the client computer by the Internet and displayed on the user's browser at step 272.

Patent Citations
Cited PatentFiling datePublication dateApplicantTitle
US5304786 *Jan 5, 1990Apr 19, 1994Symbol Technologies, Inc.High density two-dimensional bar code symbol
US5649186 *Aug 7, 1995Jul 15, 1997Silicon Graphics IncorporatedSystem and method for a computer-based dynamic information clipping service
US5671282 *Jan 23, 1995Sep 23, 1997Ricoh CorporationMethod and apparatus for document verification and tracking
US5682540 *Dec 8, 1994Oct 28, 1997Xerox CorporationSystem for representing electronic files using a paper based medium
US5710887 *Aug 29, 1995Jan 20, 1998BroadvisionComputer system and method for electronic commerce
US5745681 *Jan 11, 1996Apr 28, 1998Sun Microsystems, Inc.Stateless shopping cart for the web
US5757917 *Nov 1, 1995May 26, 1998First Virtual Holdings IncorporatedComputerized payment system for purchasing goods and services on the internet
US5765176 *Sep 6, 1996Jun 9, 1998Xerox CorporationPerforming document image management tasks using an iconic image having embedded encoded information
US5778367 *Dec 14, 1995Jul 7, 1998Network Engineering Software, Inc.Method using a computer network
US5791991 *Nov 15, 1995Aug 11, 1998Small; Maynard E.Interactive consumer product promotion method and match game
US5848413 *Jan 13, 1995Dec 8, 1998Ricoh Company, Ltd.Method and apparatus for accessing and publishing electronic documents
WO1998024036A1 *Nov 24, 1997Jun 4, 1998Carl Harry KnowlesBar code symbol driven systems for accessing information resources on the internet
WO1998024050A1 *Nov 24, 1997Jun 4, 1998Carl Harry KnowlesSystem and method for accessing internet-based information resources by scanning java-applet encoded bar code symbols
WO1998040823A1 *Mar 4, 1998Sep 17, 1998Elonex PlcMETHOD FOR COLLECTING URLs FROM PRINTED MEDIA
WO1998049813A1 *Apr 21, 1998Nov 5, 1998Rhys Evan ParryDestination website access and information gathering system
Referenced by
Citing PatentFiling datePublication dateApplicantTitle
US6098106 *Sep 11, 1998Aug 1, 2000Digitalconvergence.Com Inc.Method for controlling a computer with an audio signal
US6108656 *May 11, 1999Aug 22, 2000Neomedia Technologies, Inc.Automatic access of electronic information through machine-readable codes on printed documents
US6137654 *Jun 23, 1997Oct 24, 2000Motorola, Inc.Device having a diskette-like housing and a wireless transceiver and methods therefor
US6148331 *Apr 25, 1997Nov 14, 2000Parry; Rhys EvanDestination website access and information gathering system
US6253198 *May 11, 1999Jun 26, 2001Search Mechanics, Inc.Process for maintaining ongoing registration for pages on a given search engine
US6259367May 1, 2000Jul 10, 2001Elliot S. KleinLost and found system and method
US6311214Jun 29, 1999Oct 30, 2001Digimarc CorporationLinking of computers based on optical sensing of digital data
US6321991Feb 22, 1999Nov 27, 2001Metrologic Instruments, Inc.Web-based television system and method for enabling a viewer to access and display HTML-encoded documents located on the World Wide Web (WWW) by reading bar code symbols printed in a WWW-site guide using a wireless bar-code driven remote control device
US6321992Jan 29, 1999Nov 27, 2001Metrologic Instruments, Inc.Internet-based system and method for tracking objects bearing URL-encoded bar code symbols
US6338139 *Jul 24, 1998Jan 8, 2002Kabushiki Kaisha ToshibaInformation reproducing apparatus, authenticating apparatus, and information processing system
US6345764Jan 7, 1999Feb 12, 2002Metrologic Instruments, Inc.Hand-held WWW access device with GUI-based www browser program integrated with bar code symbol reader for automatically accessing and displaying HTML-encoded documents by reading bar code symbols
US6348970 *Apr 29, 1998Feb 19, 2002Qwest Communications Int'l., Inc.Apparatus and method for interfacing a computer network to a facsimile machine
US6375078Jan 13, 1999Apr 23, 2002Metrologic Instruments, Inc.Universal transaction machine for carrying out information-related transactions using html-encoded documents embodying transaction-enabling java-applets automatically launched and executed in response to reading code symbols
US6377986 *Feb 1, 2000Apr 23, 2002Digital Convergence CorporationRouting string indicative of a location of a database on a web associated with a product in commerce
US6386453Nov 24, 1997May 14, 2002Metrologic Instruments, Inc.System and method for carrying out information-related transactions
US6400272Mar 31, 2000Jun 4, 2002Presto Technologies, Inc.Wireless transceiver for communicating with tags
US6418325Jul 12, 1999Jul 9, 2002Motorola, Inc.Handheld device having an optical data reader
US6422474 *Sep 24, 1999Jul 23, 2002Xerox CorporationN-space indexing of digital data representations using physical tags
US6453173Jul 12, 1999Sep 17, 2002Motorola, Inc.Handheld device having an optical data reader
US6464139Sep 14, 2000Oct 15, 2002Metrologic Instruments, Inc.Wireless hand-supportable internet-enabled access terminal for enabling information-related transactions over the internet
US6484943 *Nov 2, 2000Nov 26, 2002Motorola, Inc.Method and system for assigning a computer interaction priority based on a machine-readable code
US6505776Sep 12, 2000Jan 14, 2003Metrologic Instruments, Inc.System for storing, accessing and displaying html-encoded documents relating to an object being worked upon in a work environment by a human operator wearing a wireless http-enabled client system equipped with a code symbol reader programmed to read a url-encoded symbol on the object, access said html-encoded documents from http-enabled information servers connected to an information network, and display same for review while working said object
US6510997Jan 15, 1999Jan 28, 2003Metrologic Instruments, Inc.Hand-supportable bar code symbol reading device having an integrated world wide web (www) browser command generator for automatically generating www browser program commands to initiate the execution of hyper-text transmission protocol (http) requests
US6517002Jan 19, 1999Feb 11, 2003Portable Data Technologies, Inc.System and method for intelligent data input from a machine-readable medium
US6522770Aug 1, 2000Feb 18, 2003Digimarc CorporationManagement of documents and other objects using optical devices
US6542927Jun 29, 2001Apr 1, 2003Digimarc CorporationLinking of computers based on steganographically embedded digital data
US6542933 *Apr 5, 2000Apr 1, 2003Neomedia Technologies, Inc.System and method of using machine-readable or human-readable linkage codes for accessing networked data resources
US6546418Sep 13, 2001Apr 8, 2003Airclic, Inc.Method for managing printed medium activated revenue sharing domain name system schemas
US6568596 *Oct 2, 2000May 27, 2003Symbol Technologies, Inc.XML-based barcode scanner
US6616045May 15, 2001Sep 9, 2003Neorex Co., Ltd.Transfer processing system for bar code data
US6622917Feb 18, 2000Sep 23, 2003Metrologic Instruments, Inc.System and method for composing sets of URL-encoded bar code symbols while using an internet browser program
US6622919Nov 24, 1997Sep 23, 2003Metrologic Instruments, Inc.System and method for accessing internet-based information resources by scanning Java-Applet encoded bar code symbols
US6625581Nov 22, 1999Sep 23, 2003Ipf, Inc.Method of and system for enabling the access of consumer product related information and the purchase of consumer products at points of consumer presence on the world wide web (www) at which consumer product information request (cpir) enabling servlet tags are embedded within html-encoded documents
US6643666Apr 1, 2002Nov 4, 2003James J. KernzApparatus and method for accessing a coin image compilation
US6650761Jun 29, 1999Nov 18, 2003Digimarc CorporationWatermarked business cards and methods
US6651053Aug 28, 2000Nov 18, 2003Barpoint.Com, Inc.Interactive system for investigating products on a network
US6674923Mar 28, 2000Jan 6, 2004Eastman Kodak CompanyMethod and system for locating and accessing digitally stored images
US6675165Aug 28, 2000Jan 6, 2004Barpoint.Com, Inc.Method for linking a billboard or signage to information on a global computer network through manual information input or a global positioning system
US6690813May 21, 2002Feb 10, 2004Hitachi, Ltd.Method and apparatus for recording and reproducing electronic watermark information, and recording medium
US6691914Oct 4, 2001Feb 17, 2004Airclic, Inc.Method and system for directing end user to network location of provider based on user-provided codes
US6738630Apr 10, 2001May 18, 2004Knowtate, Inc.Combining markers with location information to deliver domain-specific content to mobile devices
US6750978Aug 4, 2000Jun 15, 2004Leapfrog Enterprises, Inc.Print media information system with a portable print media receiving unit assembly
US6753883Feb 14, 2002Jun 22, 2004Airclic Inc.Printed medium activated interactive communication of multimedia information, including advertising
US6758391Nov 18, 1997Jul 6, 2004The Code CorporationInternet access of goods and services using graphical codes
US6766363Aug 31, 2000Jul 20, 2004Barpoint.Com, Inc.System and method of linking items in audio, visual, and printed media to related information stored on an electronic network using a mobile device
US6772947May 2, 2003Aug 10, 2004Symbol Technologies, Inc.XML-based barcode scanner
US6820807Nov 21, 2000Nov 23, 2004Cobblestone Software, Inc.Variable formatting of digital data into a pattern
US6827273 *Apr 17, 2002Dec 7, 2004Metrologic Instruments, Inc.Mobile bar code driven information access terminal for remotely accessing package delivery instructions from an internet information server
US6832349 *Aug 27, 2001Dec 14, 2004Cardiff Software, Inc.Remote activation of enhanced functionality features in locally created documents
US6857564 *Apr 28, 2000Feb 22, 2005Fujitsu LimitedInformation providing system, apparatus for producing a medium for providing the information, apparatus for restoring the provided information, computer product, a medium for providing the information
US6865608 *Mar 29, 2001Mar 8, 2005Neomedia Technologies, Inc.Method and system for simplified access to internet content on a wireless device
US6871780Nov 27, 2001Mar 29, 2005Airclic, Inc.Scalable distributed database system and method for linking codes to internet information
US6942150 *Nov 26, 2001Sep 13, 2005Metrologic Instruments, Inc.Web-based mobile information access terminal
US6957769Apr 12, 2002Oct 25, 2005The Code CorporationSystem and method for encoding and decoding data and references to data in machine-readable graphical codes
US6959286Oct 16, 2002Oct 25, 2005Ipf, Inc.Method and system for searching a dynamically updated database of UPN/TM/PD and URL data links
US6961712Nov 17, 1999Nov 1, 2005Ipf, Inc.Consumer product information request (CPIR) enabling servlets and web-based consumer product information catalogs employing the same
US6961713Oct 24, 2002Nov 1, 2005Ipf, Inc.Internet-based method of and system for enabling communication of consumer product information between vendors and consumers in a stream of commerce, using vendor created and managed upn/tm/pd/url data links
US6964374 *Oct 2, 1998Nov 15, 2005Lucent Technologies Inc.Retrieval and manipulation of electronically stored information via pointers embedded in the associated printed material
US6974078Sep 28, 1999Dec 13, 2005Yahoo! Inc.Personal communication device with bar code reader for obtaining product information from multiple databases
US6978038Apr 12, 2002Dec 20, 2005The Code CorporationSystems and methods for pixel gain compensation in machine-readable graphical codes
US6985954Jan 26, 2000Jan 10, 2006L. V. Partners, L.P.Input device for allowing input of a unique digital code to a user's computer to control access thereof to a web site
US6988662Apr 21, 2003Jan 24, 2006Metrologic Instruments, Inc.System and method for carrying out information-related transactions using web documents embodying transaction-enabling applets automatically launched and executed in response to reading url-encoded symbols pointing thereto
US6993573Jun 7, 2004Jan 31, 2006Neomedia Technologies, Inc.Automatic access of internet content with a camera-enabled cell phone
US6993580Oct 4, 2001Jan 31, 2006Airclic Inc.Method and system for sharing end user information on network
US7003500 *Aug 1, 2000Feb 21, 2006James Leonard DriessenRetail point of sale (RPOS) apparatus for internet merchandising
US7003800 *Nov 6, 2000Feb 21, 2006Ralph Victor BainSelf-decrypting web site pages
US7013290Jul 26, 2002Mar 14, 2006John Allen AnanianPersonalized interactive digital catalog profiling
US7016532 *Nov 5, 2001Mar 21, 2006Evryx TechnologiesImage capture and identification system and process
US7051086Mar 9, 2001May 23, 2006Digimarc CorporationMethod of linking on-line data to printed documents
US7055737 *Mar 5, 2001Jun 6, 2006Sony CoporationElectronic network and method for obtaining topic-specific information regarding a product
US7062750 *Jul 16, 2001Jun 13, 2006Microsoft CorporationAccessing remote stores of source and symbol data for use by computing tools
US7070091Feb 6, 2004Jul 4, 2006The Code CorporationSystems and methods for interfacing object identifier readers to multiple types of applications
US7070103 *Jan 3, 2001Jul 4, 2006Tripletail Ventures, Inc.Method and apparatus for bar code data interchange
US7072974Nov 20, 2001Jul 4, 2006The Code CorporationExtensible application interface using machine-readable graphical codes
US7089199Oct 24, 2002Aug 8, 2006Metrologic Instruments, Inc.System for and method of managing and delivering manufacturer-specified consumer product information to consumers in the marketplace
US7097099Feb 6, 2004Aug 29, 2006The Code CorporationData collection device with integrated data translation
US7107009Jun 26, 2002Sep 12, 2006Nokia CorporationMethod, system and computer program product for personalizing the functionality of a personal communication device
US7111170Mar 29, 2002Sep 19, 2006Digimarc CorporationDistributed system for responding to watermarked documents
US7118040 *Jan 5, 2006Oct 10, 2006Tripletail Ventures, Inc.Method and apparatus for bar code data interchange
US7129840Sep 3, 2002Oct 31, 2006Ricoh Company, Ltd.Document security system
US7130622Jun 1, 2005Oct 31, 2006Nokia CorporationDisposable mini-applications
US7143055Jun 9, 1997Nov 28, 2006Ipf, Inc.Internet-based system for collecting, managing and serving consumer product-related information over the internet using trademarks and universal resource locators (urls) symbolically-linked by manufacturers of consumer products and/or their agents
US7149957Nov 19, 2001Dec 12, 2006Ricoh Company, Ltd.Techniques for retrieving multimedia information using a paper-based interface
US7152064 *Aug 14, 2001Dec 19, 2006Exalead CorporationSearching tool and process for unified search using categories and keywords
US7159037 *Aug 24, 1999Jan 2, 2007Lv Partners, LpMethod and apparatus for utilizing an existing product code to issue a match to a predetermined location on a global network
US7162527 *Jul 15, 2002Jan 9, 2007Cmic Co., Ltd.Information communicating system, information transmitting apparatus and information transmitting method
US7164413Aug 6, 2004Jan 16, 2007Digimarc CorporationEnhanced input peripheral
US7171567Aug 1, 2000Jan 30, 2007Harris Interactive, Inc.System for protecting information over the internet
US7185824Mar 21, 2002Mar 6, 2007The Code CorporationSystem and method for associating pre-printed machine-readable graphical codes with electronically-accessible data
US7188307 *Nov 8, 2001Mar 6, 2007Canon Kabushiki KaishaAccess system
US7204417Nov 3, 2004Apr 17, 2007The Code CorporationGraphical code reader that is configured for efficient decoder management
US7215436Jun 18, 2002May 8, 2007Ricoh Company, Ltd.Device for generating a multimedia paper document
US7240831Jan 21, 2004Jul 10, 2007The Code CorporationSystems and methods for establishing communication between an identification tag reader and a computing device
US7263659Nov 19, 2001Aug 28, 2007Ricoh Company, Ltd.Paper-based interface for multimedia information
US7263671Nov 19, 2001Aug 28, 2007Ricoh Company, Ltd.Techniques for annotating multimedia information
US7266380Mar 11, 2004Sep 4, 2007Knowtate, Inc.Combining a marker with contextual information to deliver domain-specific content
US7266782Nov 19, 2001Sep 4, 2007Ricoh Company, Ltd.Techniques for generating a coversheet for a paper-based interface for multimedia information
US7274909Oct 31, 2002Sep 25, 2007Nokia CorporationMethod and system for selecting data items for service requests
US7281655Jul 13, 2006Oct 16, 2007Ikan Technologies Inc.Networked disposal and information distribution apparatus
US7299971Apr 22, 2004Nov 27, 2007Leapfrog Enterprises, Inc.Print media information systems and methods
US7303124Jul 28, 2006Dec 4, 2007Ikan Technologies, Inc.Method and system for disposing of discarded items
US7304585Jul 2, 2004Dec 4, 2007Nokia CorporationInitiation of actions with compressed action language representations
US7313251Apr 25, 2006Dec 25, 2007Digimarc CorporationMethod and system for managing and controlling electronic media
US7316347 *Jan 7, 2005Jan 8, 2008Ctb Mcgraw-HillLinking articles to content via RFID
US7328842Feb 24, 2004Feb 12, 2008Ikan Technologies Inc.Networked waste processing apparatus
US7337948Sep 18, 2006Mar 4, 2008Tripletail Ventures, Inc.Method and apparatus for bar code data interchange
US7337968 *Jan 10, 2005Mar 4, 2008Metrologic Instruments, Inc.System for storing, accessing and displaying HTML-encoded documents relating to an object being worked upon in a work environment by a human operator
US7341191Jan 23, 2006Mar 11, 2008Metrologic Instruments, Inc.Internet-based system for enabling information-related transactions over the internet
US7344063Jul 21, 2006Mar 18, 2008Ikan Technologies Inc.Networked disposal and sample provisioning apparatus
US7357300Nov 23, 2004Apr 15, 2008Ricoh Company, Ltd.Method and apparatus for tracking documents in a workflow
US7377421Apr 2, 2004May 27, 2008Digimarc CorporationMethods and systems for interacting with printed articles, such as posters
US7392933Jul 21, 2003Jul 1, 2008The Code CorporationSystems and methods for interfacing multiple types of object identifiers and object identifier readers to multiple types of applications
US7398548 *Jun 27, 2006Jul 8, 2008Lv Partners, L.P.Method and apparatus for controlling a user's pc through a broadcast communication to archive information in the user's pc
US7407099Jun 3, 2005Aug 5, 2008Hewlett-Packard Development Company, L.P.Method and apparatus for achieving a tailored content response based upon a product identifier coupled with a device identifier
US7407107Dec 8, 2003Aug 5, 2008Nokia CorporationApparatus, system, method and computer program product for creating shortcuts to functions in a personal communication device
US7424155Jun 5, 2006Sep 9, 2008Sony CorporationTwo-dimensional code recognition processing method, two-dimensional code recognition processing apparatus, and storage medium
US7424974Sep 3, 2002Sep 16, 2008Ricoh Company, Ltd.Techniques that facilitate tracking of physical locations of paper documents
US7428981Aug 23, 2005Sep 30, 2008The Code CorporationSystem and method for encoding and decoding data and references to data in machine-readable graphical codes
US7430528Aug 7, 2003Sep 30, 2008Ipf, Inc.Internet-based system for managing and delivering consumer product information to consumers along points of presence along the world wide web (WWW), using consumer product information (CPI) requesting and graphical user interface (GUI) displaying subsystems, driven by server-side components embodying universal product numbers (UPNS) and driven by UPN/URL links managed by product manufacturer team members and/or their agents
US7440993 *Aug 24, 1999Oct 21, 2008Lv Partners, L.P.Method and apparatus for launching a web browser in response to scanning of product information
US7441706Apr 6, 2001Oct 28, 2008Symbol Technologies, Inc.Method and system for processing and using information
US7441710Apr 19, 2005Oct 28, 2008Ipf, Inc.System and method for finding and serving consumer product related information to consumers using internet-based information servers and clients
US7454086Sep 28, 2004Nov 18, 2008Ricoh Company, Ltd.Techniques for positioning images in electronic documents
US7480422Oct 14, 2005Jan 20, 2009Disney Enterprises, Inc.Systems and methods for information content delivery relating to an object
US7495795Jun 18, 2003Feb 24, 2009Ricoh Company, Ltd.Interface for printing multimedia information
US7505928Sep 2, 2003Mar 17, 2009Ali LebaschiInteractive printed page optical code data access system and method
US7506250Sep 3, 2002Mar 17, 2009Ricoh Company, Ltd.Techniques for determining electronic document information for paper documents
US7509569Jul 19, 2004Mar 24, 2009Ricoh Co., Ltd.Action stickers for nested collections
US7516094Dec 12, 2002Apr 7, 2009Ipf, Inc.Internet-based system for managing and delivering consumer product information to consumers at web-based retailer store sites on the world wide web (WWW), using consumer product information (CPI) requesting and graphical user interface (GUI) display subsystems, driven by server-side components embodying universal product numbers (UPNs) and driven by UPN/URL links managed by product manufacturer team members and/or their agents
US7533040Oct 28, 2005May 12, 2009Ipf, Inc.Internet-based system for managing and delivering consumer product information at points along the world wide web using consumer product information (CPI) requesting and graphical user interface (GUI) displaying subsystems driven by server-side components and managed by consumer product manufacturers and/or authorized parties
US7536638Sep 16, 2003May 19, 2009Ricoh Co., Ltd.Action stickers for identifying and processing stored documents
US7557939Apr 22, 2004Jul 7, 2009Leapfrog Enterprises, Inc.Print media information systems and methods
US7586398Sep 19, 2003Sep 8, 2009Universal Electronics, Inc.System and method for setting up a universal remote control
US7596755Feb 21, 2002Sep 29, 2009Ricoh Company, Ltd.Multimedia visualization and integration environment
US7606533Feb 1, 2006Oct 20, 2009Nokia CorporationMethod and system for selecting data items for service requests
US7610607Feb 19, 1999Oct 27, 2009Chaincast Networks, Inc.Chaincast method and system for broadcasting information to multiple systems within the internet
US7621453Feb 23, 2006Nov 24, 2009The Code CorporationSystem and method for controlling the distribution of data translation components to portable data collection devices
US7628318Jun 4, 2007Dec 8, 2009Melick Bruce DMethod and apparatus for bar code data interchange
US7628320May 23, 2008Dec 8, 2009Digimarc CorporationMethods and systems for interacting with physical objects
US7636695Oct 31, 2005Dec 22, 2009James Leonard DriessenRetail point of sale (RPOS) apparatus for internet merchandising
US7652555Sep 3, 2002Jan 26, 2010Ricoh Company, Ltd.Container for storing objects
US7654455Jun 3, 2005Feb 2, 2010Hewlett-Packard Development Company, L.P.Method and apparatus for achieving a tailored content response based upon a product identifier combined with a user identifier and a device identifier
US7681792Mar 17, 2008Mar 23, 2010Ikan Technologies Inc.Networked disposal and sample provisioning apparatus
US7703002Mar 31, 2003Apr 20, 2010Ricoh Company, Ltd.Method and apparatus for composing multimedia documents
US7703044Dec 23, 2004Apr 20, 2010Ricoh Company, Ltd.Techniques for generating a static representation for time-based media information
US7711598Jan 28, 2002May 4, 2010Ipf, Inc.Web-based consumer product marketing communication network for managing and delivering consumer product marketing communications to consumers along e-commerce (EC) enabled web sites on the world wide web (WWW), using multi-mode virtual kiosks (MMVKS) driven by server=side components embodying consumer product identifiers and driven by consumer product information (CPI) links managed by product manufacturer team members and/or their agents
US7728872 *Oct 28, 2004Jun 1, 2010Silverbrook Research Pty LtdDigital camera with interactive printer
US7734729Dec 31, 2003Jun 8, 2010Amazon Technologies, Inc.System and method for obtaining information relating to an item of commerce using a portable imaging device
US7739583Mar 31, 2003Jun 15, 2010Ricoh Company, Ltd.Multimedia document sharing method and apparatus
US7742993Jan 11, 2006Jun 22, 2010James Leonard DriessenSCART-card (secure consumer advantaged retail trading)
US7743347 *Aug 20, 2003Jun 22, 2010Ricoh Company, Ltd.Paper-based interface for specifying ranges
US7751596Jan 8, 2009Jul 6, 2010Digimarc CorporationMethods and arrangements employing digital content items
US7757162Oct 15, 2003Jul 13, 2010Ricoh Co. Ltd.Document collection manipulation
US7774283Feb 23, 2005Aug 10, 2010Pitney Bowes Inc.Method and system for using a camera cell phone in transactions
US7779355Mar 30, 2004Aug 17, 2010Ricoh Company, Ltd.Techniques for using paper documents as media templates
US7788080Feb 8, 2005Aug 31, 2010Ricoh Company, Ltd.Paper interface for simulation environments
US7788323Sep 14, 2006Aug 31, 2010International Business Machines CorporationMethod and apparatus for sharing information in a virtual environment
US7798417Aug 1, 2007Sep 21, 2010Snyder David MMethod for data interchange
US7801359Sep 22, 2006Sep 21, 2010Disney Enterprise, Inc.Systems and methods for obtaining information associated with an image
US7805500Oct 31, 2007Sep 28, 2010Digimarc CorporationNetwork linking methods and apparatus
US7809156 *Jul 28, 2006Oct 5, 2010Ricoh Company, Ltd.Techniques for generating and using a fingerprint for an article
US7831991Mar 29, 2005Nov 9, 2010Chaincast, Inc.Method and system for ensuring continuous data flow between re-transmitters within a chaincast communication system
US7837094Dec 8, 2009Nov 23, 2010Digimarc CorporationMethods and systems for interacting with physical objects
US7844492Jun 28, 2006Nov 30, 2010Ipf, Inc.Internet-based E-commerce network for enabling commission-based E-commerce transactions along the fabric of the world wide web (WWW) using server-side driven multi-mode virtual kiosks (MMVKS) and transaction and commission tracking servers
US7848948Mar 29, 2004Dec 7, 2010Ipf, Inc.Internet-based product brand marketing communication network configured to allow members of a product brand management team to communicate directly with consumers browsing HTML-encoded pages at an electronic commerce (EC) enabled web-site along the fabric of the world wide web (WWW), using programable multi-mode virtual kiosks (MMVKS) driven by server-side components and managed by product brand management team members
US7853193Nov 1, 2005Dec 14, 2010Leapfrog Enterprises, Inc.Method and device for audibly instructing a user to interact with a function
US7884955Sep 3, 2002Feb 8, 2011Ricoh Company, Ltd.Techniques for performing actions based upon physical locations of paper documents
US7885145Oct 26, 2007Feb 8, 2011Samsung Electronics Co. Ltd.System and method for selection of an object of interest during physical browsing by finger pointing and snapping
US7886973Feb 11, 2008Feb 15, 2011Ikan Technologies Inc.Networked waste processing apparatus
US7891547 *Dec 16, 2008Feb 22, 2011Silverbrook Research Pty LtdMethod for initiating payment of bill
US7904333Oct 24, 2000Mar 8, 2011Ipf, Inc.Web-based electronic commerce (EC) enabled shopping network configured to allow members of a consumer product management team and authorized parties to communicate directly with consumers shopping at EC-enabled websites along the world wide web (WWW), using multi-mode virtual kiosks (MMVKS) driven by server-side components and managed by product team members
US7934641Oct 15, 2009May 3, 2011Roelesis Wireless LlcMethod and apparatus for bar code data interchange
US7937095Mar 7, 2007May 3, 2011Knowtate, Inc.Combining a marker with contextual information to deliver domain-specific content
US7942328Oct 17, 2006May 17, 2011Roelesis Wireless LlcMethod for data interchange
US7954056Jun 17, 2002May 31, 2011Ricoh Company, Ltd.Television-based visualization and navigation interface
US7966494Jan 8, 2007Jun 21, 2011Digimarc CorporationVisual content-based internet search methods and sub-combinations
US7969619 *Jul 27, 2007Jun 28, 2011Ricoh Company, Ltd.Information tracking method, image forming apparatus, information processing apparatus, and information tracking program
US7979786Dec 7, 2006Jul 12, 2011Ricoh Company, Ltd.Techniques for retrieving multimedia information using a paper-based interface
US7986806Jan 23, 2004Jul 26, 2011Digimarc CorporationPaper products and physical objects as means to access and control a computer or to navigate over or act as a portal on a network
US8001550Mar 22, 2004Aug 16, 2011The Code CorporationObject identifier readers that are configured to automatically send and/or store data read from an object identifier
US8009196Jun 23, 2008Aug 30, 2011Silverbrook Research Pty LtdCamera having networked interactive printer
US8023746Oct 14, 2005Sep 20, 2011Disney Enterprises, Inc.Systems and methods for decoding an image to determine a digital identifier
US8050451Jun 11, 2010Nov 1, 2011Digimarc CorporationElectronic forms using indicia, sometimes hidden indicia
US8065201May 11, 2009Nov 22, 2011Ipf, Inc.Internet-based method of and system for managing and delivering consumer product information at points along the world wide web using consumer product information (CPI) requesting and graphical user interface (GUI) displaying subsystems driven by server-side components and managed by consumer product manufactures and/or authorized parties
US8065711Oct 27, 2009Nov 22, 2011Chaincast, Inc.Chaincast method and system for broadcasting information to multiple systems within the internet
US8073198Oct 26, 2007Dec 6, 2011Samsung Electronics Co., Ltd.System and method for selection of an object of interest during physical browsing by finger framing
US8098894Jun 20, 2008Jan 17, 2012Yahoo! Inc.Mobile imaging device as navigator
US8103877Oct 25, 2004Jan 24, 2012Digimarc CorporationContent identification and electronic tickets, coupons and credits
US8103879Sep 8, 2009Jan 24, 2012Digimarc CorporationProcessing audio or video content with multiple watermark layers
US8116582Sep 29, 2008Feb 14, 2012Ricoh Company, Ltd.Techniques for positioning images in electronic documents
US8157173Aug 3, 2007Apr 17, 2012Roelesis Wireless LlcMethod for tagged bar code data interchange
US8180844Mar 18, 2000May 15, 2012Digimarc CorporationSystem for linking from objects to remote resources
US8189466Mar 12, 2009May 29, 2012Neomedia Technologies, IncMessaging interchange system
US8194914Oct 19, 2007Jun 5, 2012Spyder Lynk, LlcEncoding and decoding data into an image using identifiable marks and encoded elements
US8218195Feb 8, 2010Jul 10, 2012Silverbrook Research Pty LtdCartridge for use in printer for printing coded data
US8218873Feb 28, 2011Jul 10, 2012Nant Holdings Ip, LlcObject information derived from object images
US8218874Mar 22, 2011Jul 10, 2012Nant Holdings Ip, LlcObject information derived from object images
US8224077Jan 13, 2011Jul 17, 2012Nant Holdings Ip, LlcData capture and identification system and process
US8224078Feb 28, 2011Jul 17, 2012Nant Holdings Ip, LlcImage capture and identification system and process
US8224079Apr 21, 2011Jul 17, 2012Nant Holdings Ip, LlcImage capture and identification system and process
US8249889Jan 31, 2005Aug 21, 2012Hewlett-Packard Development Company, L.P.Providing information regarding a product
US8256665Nov 23, 2010Sep 4, 2012Digimarc CorporationMethods and systems for interacting with physical objects
US8266019Dec 22, 2004Sep 11, 2012Hewlett-Packard Development Company, L.P.Optimizing retrieval of object-associated information
US8274569 *Nov 28, 2010Sep 25, 2012Silverbrook Research Pty LtdPrinting system utilizing cartridge pre-stored with identifiers with identifying printed pages
US8282001Feb 9, 2011Oct 9, 2012Roelesis Wireless LlcMethod for data interchange
US8322607May 30, 2011Dec 4, 2012Silverbrook Research Pty LtdMethod of interacting with substrate in cursor and hyperlinking modes
US8325019Sep 13, 2010Dec 4, 2012Ricoh Company, Ltd.Motion tracking techniques for RFID tags
US8326031Mar 22, 2011Dec 4, 2012Nant Holdings Ip, LlcImage capture and identification system and process
US8326038Aug 10, 2011Dec 4, 2012Nant Holdings Ip, LlcObject information derived from object images
US8331679Aug 10, 2011Dec 11, 2012Nant Holdings Ip, LlcObject information derived from object images
US8335351Apr 21, 2011Dec 18, 2012Nant Holdings Ip, LlcImage capture and identification system and process
US8351907Sep 12, 2010Jan 8, 2013Silverbrook Research Pty LtdRetrieving a document using a print medium having encoded print medium identifier
US8379908May 16, 2006Feb 19, 2013Digimarc CorporationEmbedding and reading codes on objects
US8397037Apr 2, 2012Mar 12, 2013Yahoo! Inc.Automatic association of reference data with primary process data based on time and shared identifier
US8406531May 15, 2008Mar 26, 2013Yahoo! Inc.Data access based on content of image recorded by a mobile device
US8429005Jun 11, 2003Apr 23, 2013Activ8Now, LlcMethod for determining effectiveness of display of objects in advertising images
US8429205Aug 4, 2005Apr 23, 2013Digimarc CorporationAssociating data with media signals in media signal systems through auxiliary data steganographically embedded in the media signals
US8437544Apr 6, 2012May 7, 2013Nant Holdings Ip, LlcImage capture and identification system and process
US8452653Jun 30, 2003May 28, 2013Personal Data Network CorporationMethod for providing information and recommendations based on user activity
US8457395Jun 11, 2012Jun 4, 2013Nant Holdings Ip, LlcImage capture and identification system and process
US8458055Nov 9, 2011Jun 4, 2013Ipf, Inc.Internet-based method of and system for managing and delivering consumer product information at points along the world wide web using consumer product information (CPI) requesting and graphical user interface (GUI) displaying subsystems driven by server-side objects and managed by consumer product manufacturers and/or authorized parties
US8462986Oct 19, 2011Jun 11, 2013SpyderLynk LLCEncoding and decoding data in an image for social networking communication
US8463030Mar 22, 2011Jun 11, 2013Nant Holdings Ip, LlcImage capture and identification system and process
US8463031Jun 14, 2012Jun 11, 2013Nant Holdings Ip, LlcImage capture and identification system and process
US8467600Apr 21, 2011Jun 18, 2013Nant Holdings Ip, LlcImage capture and identification system and process
US8467602Jun 27, 2012Jun 18, 2013Nant Holdings Ip, LlcImage capture and identification system and process
US8469270Feb 25, 2012Jun 25, 2013Reagan Inventions, LlcSystems and methods for indicating the existence of accessible information pertaining to articles of commerce
US8478000Oct 3, 2011Jul 2, 2013Yahoo! Inc.Mobile imaging device as navigator
US8478036Mar 2, 2012Jul 2, 2013Nant Holdings Ip, LlcImage capture and identification system and process
US8478037Jun 29, 2012Jul 2, 2013Nant Holdings Ip, LlcImage capture and identification system and process
US8478047Apr 9, 2012Jul 2, 2013Nant Holdings Ip, LlcObject information derived from object images
US8483484Aug 10, 2011Jul 9, 2013Nant Holdings Ip, LlcObject information derived from object images
US8488880Mar 2, 2012Jul 16, 2013Nant Holdings Ip, LlcImage capture and identification system and process
US8493601Dec 28, 2010Jul 23, 2013Ricoh Company Ltd.Techniques for performing actions based upon physical locations of paper documents
US8494264May 4, 2012Jul 23, 2013Nant Holdings Ip, LlcData capture and identification system and process
US8494271May 22, 2012Jul 23, 2013Nant Holdings Ip, LlcObject information derived from object images
US8498484Feb 28, 2012Jul 30, 2013Nant Holdingas IP, LLCObject information derived from object images
US8503787Aug 10, 2011Aug 6, 2013Nant Holdings Ip, LlcObject information derived from object images
US8520942Jun 27, 2012Aug 27, 2013Nant Holdings Ip, LlcImage capture and identification system and process
US8528817Sep 4, 2012Sep 10, 2013Roetesis Wireless LLCMethods and systems for data interchange
US8539344Nov 19, 2001Sep 17, 2013Ricoh Company, Ltd.Paper-based interface for multimedia information stored by multiple multimedia documents
US8540515Nov 27, 2006Sep 24, 2013Pharos Innovations, LlcOptimizing behavioral change based on a population statistical profile
US8540516Nov 27, 2006Sep 24, 2013Pharos Innovations, LlcOptimizing behavioral change based on a patient statistical profile
US8540517Nov 27, 2006Sep 24, 2013Pharos Innovations, LlcCalculating a behavioral path based on a statistical profile
US8548245Oct 4, 2012Oct 1, 2013Nant Holdings Ip, LlcImage capture and identification system and process
US8548278Oct 2, 2012Oct 1, 2013Nant Holdings Ip, LlcImage capture and identification system and process
US8554690Mar 31, 2006Oct 8, 2013Ricoh Company, Ltd.Techniques for using media keys
US8555327Mar 28, 2011Oct 8, 2013Google Inc.Broadcasting links to enhanced content
US8582817Oct 2, 2012Nov 12, 2013Nant Holdings Ip, LlcData capture and identification system and process
US8588527Nov 27, 2012Nov 19, 2013Nant Holdings Ip, LlcObject information derived from object images
US8615487May 24, 2004Dec 24, 2013Garrison GomezSystem and method to store and retrieve identifier associated information content
US8620021Nov 21, 2012Dec 31, 2013Digimarc CorporationImage-related methods and arrangements
US8631089Dec 14, 2010Jan 14, 2014Brilliance Publishing, Inc.Previewing audio data associated with an item
US8635459Jan 31, 2005Jan 21, 2014Hewlett-Packard Development Company, L.P.Recording transactional information relating to an object
US8635531Jun 18, 2003Jan 21, 2014Ricoh Company, Ltd.Techniques for displaying information stored in multiple multimedia documents
US8655011Jan 13, 2012Feb 18, 2014Digimarc CorporationContent identification and electronic tickets, coupons and credits
US8689102Dec 8, 2006Apr 1, 2014Ricoh Company, Ltd.User interface for creating and using media keys
US8712193Dec 4, 2012Apr 29, 2014Nant Holdings Ip, LlcImage capture and identification system and process
US8718410Dec 4, 2012May 6, 2014Nant Holdings Ip, LlcImage capture and identification system and process
US8723964Sep 12, 2003May 13, 2014Sony CorporationMethod and device for communication using an optical sensor
US8733657Mar 7, 2013May 27, 2014Cutting Edge Codes LlcBarcode device
US8733658Mar 7, 2013May 27, 2014Cutting Edge Codes LlcBarcode device
US8739040Nov 4, 2003May 27, 2014Ricoh Company, Ltd.Multimedia visualization and integration environment
US8746560Jun 20, 2013Jun 10, 2014Reagan Invention, LLCSystems and methods for indicating the existence of accessible information pertaining to articles of commerce
US8746565Mar 7, 2013Jun 10, 2014Cutting Edge Codes, LLCBarcode device
US8750556Oct 10, 2006Jun 10, 2014Digimarc CorporationWatermark systems and methods
US8756673 *Mar 30, 2007Jun 17, 2014Ricoh Company, Ltd.Techniques for sharing data
US8763907Mar 7, 2013Jul 1, 2014Cutting Edge Codes LlcBarcode device
US8774463Jun 20, 2013Jul 8, 2014Nant Holdings Ip, LlcImage capture and identification system and process
US20100198867 *Apr 5, 2010Aug 5, 2010Sony CorporationInformation processing apparatus and method, information processing system, and providing medium
US20110024493 *Oct 14, 2010Feb 3, 2011Silverbrook Reseach Pty LtdSystem for providing anonymous competition entry
US20110069354 *Nov 28, 2010Mar 24, 2011Silverbrook Research Pty LtdPrinting system utilizing cartridge pre-stored with identifiers with identifying printed pages
US20110205576 *Sep 17, 2010Aug 25, 2011Allison Gaines Parrish HalronDocument management system and method
US20130050261 *Oct 25, 2012Feb 28, 2013Sony CorporationInformation processing apparatus and method, information processing system, and providing medium
US20130054420 *Oct 25, 2012Feb 28, 2013Sony CorporationInformation processing apparatus and method, information processing system, and providing medium
US20130055130 *Oct 25, 2012Feb 28, 2013Sony CorporationInformation processing apparatus and method, information processing system, and providing medium
US20130057584 *Oct 25, 2012Mar 7, 2013Sony CorporationInformation processing apparatus and method, information processing system, and providing medium
US20130067337 *Oct 25, 2012Mar 14, 2013Sony CorporationInformation processing apparatus and method, information processing system, and providing medium
USRE40683 *Jun 20, 2003Mar 24, 2009Search Mechanics, Inc.Process for maintaining ongoing registration for pages on a given search engine
EP1139649A2 *Mar 16, 2001Oct 4, 2001Eastman Kodak CompanyMethod and system for locating and accessing digitally stored images
EP1265166A2 *Nov 5, 2001Dec 11, 2002Symbol Technologies Inc.Method and system for processing and using information
EP1895435A1 *Aug 3, 2007Mar 5, 2008Ricoh Company, Ltd.Information tracking method, image forming apparatus, information processing apparatus, and information tracking program
EP1923783A1 *Sep 29, 2006May 21, 2008British Telecommunications Public Limited CompanyInformation processing system and related method
WO2000060484A1 *Apr 5, 2000Oct 12, 2000Neomedia Tech IncSystem and method of using machine-readable or human-readable linkage codes for accessing networked data resources
WO2001071954A1 *Mar 17, 2000Sep 27, 2001Motorola IncNetwork navigation methods, systems, and articles using a printed publication
WO2001075629A1 *Mar 29, 2001Oct 11, 2001Neomedia Tech IncSystem for accessing internet via wireless device using linkage url bar-code
WO2002021233A2 *Sep 5, 2001Mar 14, 2002Mrsic FlogelData communications
WO2008038017A1 *Sep 28, 2007Apr 3, 2008British TelecommInformation processing system and related method
WO2008127096A1 *Apr 11, 2008Oct 23, 2008Ideatics B VSystem and method for obtaining object data
WO2012000092A1 *Jun 28, 2011Jan 5, 2012Lionstone Capital CorporationSeamless end-to-end data obfuscation and encryption
Classifications
U.S. Classification1/1, 707/E17.113, 707/999.01, 707/999.003
International ClassificationG06F13/00, G06K7/00, G06Q30/00, G06F12/00, H04N1/333, H04N1/44, G06F17/30, H04L9/32
Cooperative ClassificationH04L2209/56, H04L9/3236, H04L2209/16, Y10S707/99933, Y10S707/99939, H04N1/4406, H04N2201/33357, G06F17/30879, H04N1/33323
European ClassificationH04L9/32S, H04N1/333B3, G06F17/30W5B, H04N1/44A
Legal Events
DateCodeEventDescription
Aug 2, 2011SULPSurcharge for late payment
Year of fee payment: 11
Aug 2, 2011FPAYFee payment
Year of fee payment: 12
Mar 7, 2011REMIMaintenance fee reminder mailed
Nov 2, 2010ASAssignment
Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:AIRCLIC, INC.;REEL/FRAME:025227/0578
Effective date: 20101101
Owner name: NEOMEDIA TECHNOLOGIES, INC., GEORGIA
Oct 4, 2007ASAssignment
Owner name: YA GLOBAL INVESTMENTS, LP, NEW JERSEY
Free format text: SECURITY AGREEMENT;ASSIGNORS:NEOMEDIA TECHNOLOGIES, INC.;NEOMEDIA TELECOM SERVICES, INC.;NEOMEDIA MICRO PAINT REPAIR, INC.;AND OTHERS;REEL/FRAME:019943/0778;SIGNING DATES FROM 20070824 TO 20070914
Mar 27, 2007ASAssignment
Owner name: CORNELL CAPITAL PARTNERS, L.P., NEW JERSEY
Free format text: SECURITY AGREEMENT;ASSIGNOR:NEOMEDIA TECHNOLOGIES, INC.;REEL/FRAME:019069/0253
Effective date: 20070326
Jan 10, 2007FPAYFee payment
Year of fee payment: 8
Jul 15, 2003SULPSurcharge for late payment
Jul 15, 2003FPAYFee payment
Year of fee payment: 4
Feb 19, 2003REMIMaintenance fee reminder mailed
Oct 26, 2001ASAssignment
Owner name: GOINS, WILLIAM E., FLORIDA
Free format text: LAWSUIT AGAINST PATENT OWNER GOINS VS. NEOMEDIA TECHNOLOGIES, INC., 20TH JUDICIAL CIRCUIT, SARASOTACOUNTY, FLORIDA, #2001CA5813;ASSIGNORS:NEOMEDIA TECHNOLOGIES, INC.;FRITZ, CHARLES W.;KEIL, JAMES J.;AND OTHERS;REEL/FRAME:012831/0111
Effective date: 20010427
Owner name: GOINS, WILLIAM E. 845 MACEWEN DRIVE OSPREY FLORIDA
Owner name: GOINS, WILLIAM E. 845 MACEWEN DRIVEOSPREY, FLORIDA
Free format text: LAWSUIT AGAINST PATENT OWNER GOINS VS. NEOMEDIA TECHNOLOGIES, INC., 20TH JUDICIAL CIRCUIT, SARASOTACOUNTY, FLORIDA, #2001CA5813;ASSIGNORS:NEOMEDIA TECHNOLOGIES, INC. /AR;REEL/FRAME:012831/0111
Jul 31, 2001ASAssignment
Owner name: AIRCLIC, INC., PENNSYLVANIA
Free format text: SECURITY AGREEMENT;ASSIGNOR:NEOMEDIA TECHNOLOGIES, INC.;REEL/FRAME:012036/0319
Effective date: 20010711
Owner name: AIRCLIC, INC. BUILDING 5, SUITE 200 512 TOWNSHIP L
Free format text: SECURITY AGREEMENT;ASSIGNOR:NEOMEDIA TECHNOLOGIES, INC. /AR;REEL/FRAME:012036/0319
Mar 28, 2000CCCertificate of correction
Mar 26, 1998ASAssignment
Owner name: NEOMEDIA TECHNOLOGIES, INC., FLORIDA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DURST, ROBERT T., JR.;HUNTER, KEVIN;REEL/FRAME:009060/0716
Effective date: 19980324